摘要(英) |
Along with the rapid growth of smart phone users, mobile Internet penetration increased,
more and more of banking service can be done by smart phone, it can also provide customized
services to customers. When mobile bank began to touch everyone′s life, it will access the
customer′s private information, and in this time, it will be the important issue whether user is
willing to share the private information. In this study, sharing information through mobile
banking model (Mobile bank Information Sharing Model, MBIS Model), to explore when
banks offer different privacy mechanism, the user is able to enhance the privacy of
information shared intention? Methods depending on privacy mechanisms to design two kinds
of questionnaire survey for the subjects who is interesting in financial products, banking
industry, and unwilling to share personal information private.
The results found that through the mechanism of privacy can really enhance the user′s
trust perception and reduce perceived risk perception, indirect effecting subsequent intended
use perception, but different privacy mechanisms have different effects, providing privacy
mechanism category "Privacy empowerment" will be more significant effect. This study
expected when the mobile bank service will be implemented in the future, providing
appropriate policy direction, to reduce customer concerns about the privacy of personal
information, and to enhance the use of mobile banking intentions. |
參考文獻 |
68
參考文獻
一、 英文部分
[1] Ajzen, I. and M. Fishbein (1980). "Understanding attitudes and predicting social
behaviour."
[2] Baird, I. S. and H. Thomas (1985). "Toward a contingency model of strategic risk
taking." Academy of Management review 10(2): 230-243.
[3] Bauer, R. (1960). Consumer Behavior as Risk Taking. W: Dynamic Marketing for a
Changing World. Red. RS Hancock. Proceedings of the 43rd Conference of the
American Marketing Association, Chicago.
[4] Byrne, B. M., R. J. Shavelson and B. Muthén (1989). "Testing for the equivalence of
factor covariance and mean structures: The issue of partial measurement invariance."
Psychological bulletin 105(3): 456.
[5] Chaudhuri, A. and M. B. Holbrook (2001). "The chain of effects from brand trust and
brand affect to brand performance: the role of brand loyalty." Journal of marketing 65(2):
81-93.
[6] Chou, C.-P. and P. M. Bentler (1995). "Estimates and tests in structural equation
modeling."
[7] Cox, D. F. (1964). " Perceived Risk and Consumer Decision-Making: The Case of
Telephone Shopping" Journal of marketing research 1(4): 32-39.
[8] D Harrison McKnight, N. L. C. (2001). "What trust means in e-commerce customer
relationships: an interdisciplinary conceptual typology." International Journal of
Electronic Commerce 6(2): 35-59.
[9] Dowling, G. R. and R. Staelin (1994). "A model of perceived risk and intended
risk-handling activity." Journal of consumer research: 119-134.
69
[10] Fornell, C. and D. F. Larcker (1981). "Structural equation models with unobservable
variables and measurement error: Algebra and statistics." Journal of marketing research:
382-388.
[11] Gormley, K. (1992). "One hundred years of privacy." Wis. L. Rev.: 1335.
[12] Guilford, J. (1965). Fundamental statistics in psychology and education 4th Ed.
[13] Hair, J. F., W. C. Black, B. J. Babin, R. E. Anderson and R. L. Tatham (2006).
Multivariate data analysis, Pearson Prentice Hall Upper Saddle River, NJ.
[14] Hetcher, S. A. (2001). "Norm Proselytizers Create a Privacy Entitlement in Cyberspace."
Berkeley Technology Law Journal: 877-935.
[15] Hoffman, D. L., T. P. Novak and M. Peralta (1999). "Building consumer trust online."
Communications of the ACM 42(4): 80-85.
[16] Hourahine, B. and M. Howard (2004). "Money on the move: Opportunities for financial
service providers in the ‘third space’." Journal of Financial Services Marketing 9(1):
57-67.
[17] Jaccard, J. and R. Turrisi (2003). Interaction effects in multiple regression, Sage.
[18] Jacoby, J. and L. B. Kaplan (1972). "The components of perceived risk." Advances in
consumer research 3(3): 382-383.
[19] Jarvenpaa, S. L., N. Tractinsky and L. Saarinen (1999). "Consumer trust in an internet
store: a cross‐cultural validation." Journal of Computer‐Mediated Communication 5(2):
0-0.
[20] Jöreskog, K. G. and D. Sörbom (1989). LISREL 7: A guide to the program and
applications, Spss.
[21] Kimery, K. M. and M. McCord (2002). "Third-party assurances: Mapping the road to
trust in e-retailing." JITTA: Journal of Information Technology Theory and Application
4(2): 63.
[22] Koufaris, M. and W. Hampton-Sosa (2004). "The development of initial trust in an
online company by new customers." Information & management 41(3): 377-397. 70
[23] Lauer, T. W. and X. Deng (2007). "Building online trust through privacy practices."
International Journal of Information Security 6(5): 323-331.
[24] Malhotra, N. K., S. S. Kim and J. Agarwal (2004). "Internet users′ information privacy
concerns (IUIPC): The construct, the scale, and a causal model." Information Systems
Research 15(4): 336-355.
[25] Mayer, R. C., J. H. Davis and F. D. Schoorman (1995). "An integrative model of
organizational trust." Academy of Management review 20(3): 709-734.
[26] McCallister, E., T. Grance and K. Scarfone (2010). Guide to protecting the
confidentiality of personally identifiable information (PII).
[27] McKnight, D. H., L. L. Cummings and N. L. Chervany (1998). "Initial trust formation in
new organizational relationships." Academy of Management review 23(3): 473-490.
[28] Mitchell, V.-W. and M. Greatorex (1993). "Risk perception and reduction in the purchase
of consumer services." Service Industries Journal 13(4): 179-200.
[29] Nowak, G. J. and J. Phelps (1995). "Direct marketing and the use of individual‐level
consumer information: Determining how and when “privacy” matters." Journal of Direct
Marketing 9(3): 46-60.
[30] Nunnally, J. (1978). Psychometric methods, New York: McGraw-Hill.
[31] Park, D.-H., J. Lee and I. Han (2007). "The effect of on-line consumer reviews on
consumer purchasing intention: The moderating role of involvement." International
Journal of Electronic Commerce 11(4): 125-148.
[32] Pavlou, P. A. (2003). "Consumer acceptance of electronic commerce: Integrating trust
and risk with the technology acceptance model." International Journal of Electronic
Commerce 7(3): 101-134.
[33] Phelps, J., G. Nowak and E. Ferrell (2000). "Privacy concerns and consumer willingness
to provide personal information." Journal of Public Policy & Marketing 19(1): 27-41.
[34] Reichheld, F. F. and P. Schefter (2000). "E-loyalty: Your secret weapon on the Web."
Harvard business review 78(4): 105-113 71
[35] Schiffman, L. G., H. Hansen and L. L. Kanuk (2008). Consumer behaviour: A European
outlook, Pearson Education.
[36] Smith, H. J., S. J. Milberg and S. J. Burke (1996). "Information privacy: measuring
individuals′ concerns about organizational practices." MIS Quarterly: 167-196.
[37] Stone, R. N. and K. Grønhaug (1993). "Perceived risk: Further considerations for the
marketing discipline." European Journal of Marketing 27(3): 39-50.
[38] Suh, B. and I. Han (2003). "Effect of trust on customer acceptance of Internet banking."
Electronic Commerce research and applications 1(3): 247-263.
[39] Thomas, K. W. and B. A. Velthouse (1990). "Cognitive elements of empowerment: An
“interpretive” model of intrinsic task motivation." Academy of Management review
15(4): 666-681.
[40] Van Dyke, T. P., V. Midha and H. Nemati (2007). "The effect of consumer privacy
empowerment on trust and privacy concerns in e‐commerce." Electronic Markets 17(1):
68-81.
[41] Venkatesh, V., M. G. Morris, G. B. Davis and F. D. Davis (2003). "User acceptance of
information technology: Toward a unified view." MIS Quarterly: 425-478.
[42] Wang, H., M. K. Lee and C. Wang (1998). "Consumer privacy concerns about Internet
marketing." Communications of the ACM 41(3): 63-70.
[43] Wang, Y.-S., Y.-M. Wang, H.-H. Lin and T.-I. Tang (2003). "Determinants of user
acceptance of Internet banking: an empirical study." International Journal of Service
Industry Management 14(5): 501-519.
[44] Warren, S. D. and L. D. Brandeis (1890). "The right to privacy." Harvard law review:
193-220.
[45] Westin, A. F. (1968). "Privacy and freedom." Washington and Lee Law Review 25(1):
166.
[46] Wu, J.-H. and S.-C. Wang (2005). "What drives mobile commerce?: An empirical
evaluation of the revised technology acceptance model." Information & management
42(5): 719-729. 72
[47] Yousafzai, S. Y., J. G. Pallister and G. R. Foxall (2003). "A proposed model of e-trust for
electronic banking." Technovation 23(11): 847-860.
[48] Zolin, R., P. J. Hinds, R. Fruchter and R. E. Levitt (2004). "Interpersonal trust in
cross-functional, geographically distributed work: A longitudinal study." Information and
organization 14(1): 1-26.
二、 中文部分
[1] 王振浩,"影響消費者採用網路銀行行為意向之因素研究",國立中央大學,碩士論
文,民國 90 年。
[2] 任文瑗、范錚強 和 許通安,"資訊隱私侵害行為意圖之研究.",資訊,科技與社會
6(2), 77〜100 頁,民國 95 年。
[3] 江怡慧 和 陳怡樺,"網路銀行使用者之行為分析",產業金融季刊, 107,民國 89
年。
[4] 吳佩芬,"BANK 3.0 銀行未來式-透過行動銀行線上開立存款帳戶可行性之探討
[以第一銀行為例].",國立中央大學,碩士論文,民國 104 年。
[5] 李俊磊,"網站隱私權政策分析-以台灣網站為例.",國立政治大學,碩士論文,民
國 92 年。
[6] 邱皓政,量化研究與統計分析,五南圖書出版股份有限公司,台北市,民國 92 年。
[7] 張薰尹,"網際網路銀行與傳統銀行差異之研究: 以交易成本觀點探討之.",文化大
學,碩士論文,民國 89 年。
[8] 陳建源,"制度信任知覺, 認知有用性, 認知易用性對消費者使用意圖知覺之影響—
以行動商務為例.",國立成功大學,碩士論文,民國 98 年。
[9] 黃芳銘,社會科學統計方法學: 結構方程模式,五南圖書出版股份有限公司,台北
市,民國 93 年。
[10] 賴冠名,"使用者資訊隱私顧慮和網站引司機制對信任知覺的影響─ 以 Facebook 台灣使用者為例",國立中央大學,碩士論文,民國 99 年。
[11] BRETT KING,BANK3.0 銀行轉型未來式,孫一仕,施祖琪,蕭俊傑 譯,二版,財
團法人台灣金融研訓院發行,民國 104 年。
[12] 吳珮華,"行動銀行之研究",台北市,民國 102 年。
[13] Chris Skinner,DIGITAL BANK 數位銀行,孫一仕 譯,財團法人台灣金融研訓院
發行,民國 103 年。
[14] Bruce Schneier,當信任崩壞:密碼學專家告訴你,如何面對社會中的貪婪與背叛,
防範信任機制的全球大失靈,洪慧芳 譯,漫遊者文化事業股份有限公司,民國 104
年。
[15] 台灣網路資訊中心:『2015 年台灣寬頻網路使用調查報告』,2015 年,取自
http://www.twnic.net.tw/download/200307/20150901e.pdf
[16] 資策會創研所(FIND):台灣地區使用行動裝置上網數據調查,2015 年,取自
http://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1367&fm_sqno=14
[17] 金管會:「打造數位化金融環境 3.0」推動情形,2015 年,取自
http://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp
&dataserno=201502100002&toolsflag=Y&dtable=News
[18] 第一銀行_第 e 個網:網路銀行之提供功能,2015 年,取自
https://www.firstbank.com.tw/A2_3_1.action
[19] 台灣金融研訓院:落實金融 3.0 建構數位銀行資訊發展策略,2015,取自
https://www-950.ibm.com/events/wwe/grp/grp023.nsf/vLookupPDFs/03_1106_Digital_
Bank_Case_Study_Workshop_Hong_Wu/$file/03_1106_Digital_Bank_Case_Study_Wo
rkshop_Hong_Wu.pdf |